This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.

This Website Uses CookiesBy closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.

Columns

Topics

As enterprises expand across the globe, so do the responsibilities of a security executive. Industry experts weigh in on wide-ranging issues from international investigations to supply chain resilience and more.

Security Integrators are a necessary link between security product manufacturers and enterprise security leaders. In this regular column, we ask leading security integrators what trends they’re seeing on the horizon, and how security enterprise leaders can be prepared.

In the security industry, transformation is inevitable. In this column, Brian Allen sparks a dialogue on leadership, management challenges and the evolution of the security profession. Join in the conversation here.

Intelligence is becoming as essential for modern security in the private and non-profit sectors as it has long been for governments. In this column, Daniil Davydoff helps you navigate and leverage the latest ideas and developments in intelligence analysis, global and workplace risk, threat assessments and investigations.

ARTICLES

When the General Data Protection Regulation (GDPR) was enacted more than a year ago, it was far reaching, and many organizations were caught off guard because they thought it didn’t apply to them. But in fact, it did. Now the California Consumer Privacy Act (CCPA) is about to go into effect.

Anxious feelings towards facial recognition can, if unchecked, reach a point where they undermine common sense and our ability to leverage new technologies in the protection of the innocent and prosecution of the guilty.

From an employer perspective, hiring top security talent for your team can be a challenge. As a hiring manager, you need to understand how to best select and leverage a search firm to support your efforts.

Events

A critical event is defined as an incident that disrupts normal operations, such as severe weather, crime, violence and critical equipment or technology failures. Business continuity and crisis response plans can only go so far if there isn't buy-in across functions, with executive-level support.

In this webinar, security expert Pieter Danhieux explores how CISOs and CIOs can inspire real change, fostering a positive security culture that enables their development teams to become more security-aware, more aligned with internal AppSec specialists and, ultimately, securing code as it is written.

Products

Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics.

Our special report this month features 26 security leaders who are changing the industry, inspiring many and leading with innovation. Security experts discuss the CCPA, public-private relationships, mobile device security and how aware employees can mitigate active shooter events and workplace violence.